Venkataramaiah
Mahesh Venkataramaiah, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110231956 | Environmentally Adjusted Transgenic Plants - The present invention relates to a novel transgenic plant having tolerance to salt stress. The plant is transformed with a recombinant nucleic acid encoding glutamic acid decarboxylase isolated from | 09-22-2011 |
20110277188 | Change in Plant Architecture - The present invention relates to method for generating plants having altered architecture by introducing into plants, isolated nucleic acid molecules that can be used to produce transgenic plants characterized by altered plant architecture, carbon and nitrogen partitioning, enhanced biomass and or improved harvestable yield and to plants so generated and parts of these plants. More particularly, the present invention relates to a method for modifying a plant so as to produce a plant exhibiting an altered phenotype. Also provided are isolated nucleic sequence that encodes GAD polypeptide, vectors capable of expressing such nucleic acid molecules, host cells containing such vectors, and polypeptide encoded by such nucleic acids. | 11-10-2011 |
20120017334 | Nitrogen Use Efficient Transgenic Plants - The present invention relates to glutamate decarboxylase (GAD) gene sequence isolated from | 01-19-2012 |
Narasimhan Venkataramaiah, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20130061047 | SECURE AND EFFICIENT OFFLOADING OF NETWORK POLICIES TO NETWORK INTERFACE CARDS - Techniques for efficient and secure implementation of network policies in a network interface controller (NIC) in a host computing device operating a virtualized computing environment. In some embodiments, the NIC may process and forward packets directly to their destinations, bypassing a parent partition of the host computing device. In particular, in some embodiments, the NIC may store network policy information to process and forward packets directly to a virtual machine (VM). If the NIC is unable to process a packet, then the NIC may forward the packet to the parent partition. In some embodiments, the NIC may use an encapsulation protocol to transmit address information in packet headers. In some embodiments, this address information may be communicated by the MC to the parent partition via a secure channel. The NIC may also obtain, and decrypt, encrypted addresses from the VMs for routing packets, bypassing the parent partition. | 03-07-2013 |
Narasimhan A. Venkataramaiah, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20100174808 | NETWORK PRESENCE OFFLOADS TO NETWORK INTERFACE - A computing device that has a network interface that performs a subset of possible networking functions while the computing device is in a sleep mode. The subset of functions may be simply implemented on the network interface, yet to substantially reduce the frequency with which the computing device has to wake up to perform networking functions. The subset of functions may be selected to maintain a network presence of the computing device while the device is in sleep mode, and may include responding to requests for MAC information, sending keep-alive messages or exchanging security information that, in accordance with network protocols, has a limited lifetime that would otherwise expire while the computing device is in sleep mode. | 07-08-2010 |
Narasimhan A. Venkataramaiah, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20100070642 | OFFLOADING NETWORK PROTOCOL OPERATIONS TO NETWORK INTERFACE IN SLEEP STATE - A computing device participates in network protocol operations when the computing device is in an inactive state. A main processor of the computing device transfers protocol mode instructions and data corresponding to a selected network protocol to a network interface of the computing device, and the network interface executes the protocol mode instructions on behalf of the main processor when the main processor is in the inactive state. The main processor may select a network protocol from two or more network protocols and may download protocol mode instructions and data corresponding the selected network protocol to the network interface. The network interface may compare a received packet to at least one received packet pattern and may respond to the received packet in accordance with a result of the comparison. | 03-18-2010 |
20100218248 | REDIRECTION OF SECURE DATA CONNECTION REQUESTS - Methods, systems, and computer-readable media are disclosed for processing a secure data connection request. A particular method receives, at a first gateway, a secure data connection request from a client identifying a server to connect to. The first gateway sends the client device a redirect message instructing the client device to attempt alternate connection via a second gateway. The client sends a secure data connection request to the second gateway and the second gateway facilitates the secure data connection between the client and the server. | 08-26-2010 |
20130031544 | VIRTUAL MACHINE MIGRATION TO MINIMIZE PACKET LOSS IN VIRTUALIZED NETWORK - Methods and apparatus are provided for controlling live migration of a virtual machine from a first host to a second host in a data center. A virtual machine manager may distribute to at least one host in a virtual network an updated mapping policy that maps a customer address of the virtual machine to a provider address of the migrated virtual machine. The updated mapping policy enables hosts in the virtual network to communicate with the migrated virtual machine. The updated mapping policy can be a shadow policy. The shadow policy is transmitted to hosts in the virtual network by the virtual machine manager before live migration of the virtual machine completes and is maintained by recipient hosts in an inactive state until triggered. The virtual machine manager notifies hosts in the virtual network to activate the shadow policy when live migration completes. | 01-31-2013 |
20130047151 | VIRTUALIZATION GATEWAY BETWEEN VIRTUALIZED AND NON-VIRTUALIZED NETWORKS - Methods and apparatus are provided for controlling communication between a virtualized network and non-virtualized entities using a virtualization gateway. A packet is sent by a virtual machine in the virtualized network to a non-virtualized entity. The packet is routed by the host of the virtual machine to a provider address of the virtualization gateway. The gateway translates the provider address of the gateway to a destination address of the non-virtualized entity and sends the packet to the non-virtualized entity. The non-virtualized entity may be a physical resource, such as a physical server or a storage device. The physical resource may be dedicated to one customer or may be shared among customers. | 02-21-2013 |
Narasimhan Agrahara Venkataramaiah, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20090319667 | Optimal Source Interface Selection - Aspects of the subject matter described herein relate to selecting a source interface with which to establish a connection. In aspects, a profile for each network location a host has seen is maintained in a data store. The profile includes information about the network interfaces available to a source host at the network location. This information indicates, among other things, the reliability of each interface of the source host. Based on the profile, an interface is selected with which to establish a connection. If the interface is unsuccessful in establishing the connection, the interface is de-prioritized and another interface may be selected. | 12-24-2009 |
20130232272 | Optimal Source Interface Selection - Aspects of the subject matter described herein relate to selecting a source interface with which to establish a connection. In aspects, a profile for each network location a host has seen is maintained in a data store. The profile includes information about the network interfaces available to a source host at the network location. This information indicates, among other things, the reliability of each interface of the source host. Based on the profile, an interface is selected with which to establish a connection. If the interface is unsuccessful in establishing the connection, the interface is de-prioritized and another interface may be selected. | 09-05-2013 |
Nataraj Venkataramaiah, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20090287729 | SOURCE CODE COVERAGE TESTING - Code coverage testing of an application (e.g., to determine which blocks of source code are executed during run-time testing) in an operating system is accomplished using instrumented code and a performance analysis profiler. That is, non-executable code statements (e.g., T-SQL in-line comments) are injected into the source code at respective executable statements, and metadata is generated for respective source code elements. The performance analysis profiler monitors the testing of the application, generating trace data. Trace data is combined with metadata to generate code coverage reports for the application's source code, which provide, among other things, an indication of the thoroughness of the test (e.g., number of available application instructions that are actually executed during the test). | 11-19-2009 |
Praveen H. Venkataramaiah, Woodland Hills, CA US
Patent application number | Description | Published |
---|---|---|
20100125839 | Specifying, Determining and Overriding Software Dependencies - There is disclosed apparatus and processes for managing dependencies of program packages available to be run on a processor. The program packages have respective version numbers, and plural versions of at least one of the program packages are available to be run on the processor. Default dependency settings may be overridden by a user. During run-time, the override settings are referenced and utilized. | 05-20-2010 |